<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 20:19:20 +0000</lastBuildDate>
    <item>
      <title>1da7fe6d-db40-4c64-a405-8eadc9acae14</title>
      <link>https://vulnerability.circl.lu/sighting/1da7fe6d-db40-4c64-a405-8eadc9acae14/export</link>
      <description>{"uuid": "1da7fe6d-db40-4c64-a405-8eadc9acae14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23827", "type": "seen", "source": "https://t.me/thebugbountyhunter/5174", "content": "CVE-2021-23827: Sakura Samurai discover cleartext pictures in Keybase Desktop Client; Windows, macOS, Linux https://johnjhacking.com/blog/cve-2021-23827/", "creation_timestamp": "2021-02-22T20:25:43.000000Z"}</description>
      <content:encoded>{"uuid": "1da7fe6d-db40-4c64-a405-8eadc9acae14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23827", "type": "seen", "source": "https://t.me/thebugbountyhunter/5174", "content": "CVE-2021-23827: Sakura Samurai discover cleartext pictures in Keybase Desktop Client; Windows, macOS, Linux https://johnjhacking.com/blog/cve-2021-23827/", "creation_timestamp": "2021-02-22T20:25:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1da7fe6d-db40-4c64-a405-8eadc9acae14/export</guid>
      <pubDate>Mon, 22 Feb 2021 20:25:43 +0000</pubDate>
    </item>
    <item>
      <title>7df6e353-d04b-4679-9564-f7c5fb0722e2</title>
      <link>https://vulnerability.circl.lu/sighting/7df6e353-d04b-4679-9564-f7c5fb0722e2/export</link>
      <description>{"uuid": "7df6e353-d04b-4679-9564-f7c5fb0722e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23827", "type": "seen", "source": "https://t.me/cibsecurity/23966", "content": "\u203c CVE-2021-23827 \u203c\n\nKeybase Desktop Client before 5.6.0 on Windows and macOS, and before 5.6.1 on Linux, allows an attacker to obtain potentially sensitive media (such as private pictures) in the Cache and uploadtemps directories. It fails to effectively clear cached pictures, even after deletion via normal methodology within the client, or by utilizing the \"Explode message/Explode now\" functionality. Local filesystem access is needed by the attacker.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-23T02:34:02.000000Z"}</description>
      <content:encoded>{"uuid": "7df6e353-d04b-4679-9564-f7c5fb0722e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23827", "type": "seen", "source": "https://t.me/cibsecurity/23966", "content": "\u203c CVE-2021-23827 \u203c\n\nKeybase Desktop Client before 5.6.0 on Windows and macOS, and before 5.6.1 on Linux, allows an attacker to obtain potentially sensitive media (such as private pictures) in the Cache and uploadtemps directories. It fails to effectively clear cached pictures, even after deletion via normal methodology within the client, or by utilizing the \"Explode message/Explode now\" functionality. Local filesystem access is needed by the attacker.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-23T02:34:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7df6e353-d04b-4679-9564-f7c5fb0722e2/export</guid>
      <pubDate>Tue, 23 Feb 2021 02:34:02 +0000</pubDate>
    </item>
  </channel>
</rss>
